{"id":377777,"date":"2026-04-06T11:38:11","date_gmt":"2026-04-06T11:38:11","guid":{"rendered":"https:\/\/www.newsbeep.com\/il\/377777\/"},"modified":"2026-04-06T11:38:11","modified_gmt":"2026-04-06T11:38:11","slug":"moving-from-awareness-to-execution","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/il\/377777\/","title":{"rendered":"Moving From Awareness to Execution"},"content":{"rendered":"<p>                                    On March 25, Google released a blog post titled \u201c<a class=\"Link\" href=\"https:\/\/blog.google\/innovation-and-ai\/technology\/safety-security\/cryptography-migration-timeline\/\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">Quantum frontiers may be closer than they appear<\/a>.\u201d Here\u2019s how it begins:<\/p>\n<p>\u201cGoogle\u2019s introducing a 2029 timeline to secure the quantum era with post-quantum cryptography (PQC) migration.<\/p>\n<p>\u201cLast month, <a class=\"Link\" href=\"https:\/\/blog.google\/innovation-and-ai\/technology\/safety-security\/the-quantum-era-is-coming-are-we-ready-to-secure-it\/\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">we called to secure the quantum era<\/a> before a future quantum computer can break current encryption. This new timeline reflects migration needs for the PQC era in light of progress on quantum computing <a class=\"Link\" href=\"https:\/\/blog.google\/innovation-and-ai\/technology\/research\/google-willow-quantum-chip\/\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">hardware development<\/a>, <a class=\"Link\" href=\"https:\/\/www.nature.com\/articles\/s41586-024-08449-y\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">quantum error correction<\/a> and <a class=\"Link\" href=\"https:\/\/security.googleblog.com\/2025\/05\/tracking-cost-of-quantum-factori.html\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">quantum factoring resource estimates<\/a>.\u201d<\/p>\n<p>In a related and <a class=\"Link\" href=\"https:\/\/research.google\/blog\/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly\/\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">more detailed Google blog on the topic of safeguarding cryptocurrencies<\/a> that was released on March 31, they elaborated:<\/p>\n<p>\u201c<a class=\"Link\" href=\"https:\/\/blog.google\/innovation-and-ai\/technology\/safety-security\/cryptography-migration-timeline\/\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">Google has led the responsible transition<\/a> to post-quantum cryptography <a class=\"Link\" href=\"https:\/\/security.googleblog.com\/2016\/07\/experimenting-with-post-quantum.html\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">since 2016<\/a>. In a new <a class=\"Link\" href=\"https:\/\/arxiv.org\/abs\/2603.28846\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">whitepaper<\/a>, we show that future quantum computers may break the <a class=\"Link\" href=\"https:\/\/en.wikipedia.org\/wiki\/Elliptic-curve_cryptography\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">elliptic curve cryptography<\/a> that protects cryptocurrency and other systems with fewer qubits and gates than previously realized. We want to raise awareness on this issue and are providing the cryptocurrency community with recommendations to improve security and stability before this is possible, including transitioning blockchains to post-quantum cryptography (PQC), which is resistant to quantum attacks.<\/p>\n<p>\u201cTo share this research responsibly, we engaged with the U.S. government and developed a new method to describe these vulnerabilities via a zero-knowledge proof, so they can be verified without providing a roadmap for bad actors. We urge other research teams to do the same to keep people safe. We look forward to <a class=\"Link\" href=\"https:\/\/blog.google\/innovation-and-ai\/technology\/safety-security\/the-quantum-era-is-coming-are-we-ready-to-secure-it\/\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">continuing our work across the industry<\/a> following our 2029 timeline alongside others working on responsible approaches, like Coinbase, the Stanford Institute for Blockchain Research, and the Ethereum Foundation.\u201d<\/p>\n<p>CYBER IMPLICATIONS OF PQC<br \/>Commenting on these announcements, DigiCert CEO Amit Sinha, who just moderated a PQC conversation on this topic at the <a class=\"Link\" href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/rsac-2026-highlights-from-agentic-ai-to-active-defense\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">RSA Conference<\/a>, said this:<\/p>\n<p>\u201cGoogle\u2019s updated 2029 timeline is indeed a wake-up call, but it\u2019s not new information. Gartner identified 2029 as a critical milestone back in 2024, and the industry has already lost valuable time. What\u2019s changing now is that when a company like Google reinforces that urgency, more organizations may finally start to act.<\/p>\n<p>\u201cAt RSA Conference last week, I had the opportunity to moderate a panel with leaders like Michele Mosca, Bruno Couillard and Taher Elgamal on the future of PKI in a post-quantum\u00a0world. One thing was clear: The conversation has shifted from if\u00a0quantum\u00a0disruption is coming to how quickly organizations can adapt their trust models.<\/p>\n<p>\u201cBut we\u2019re already seeing early movement: Roughly 40 percent of the most popular websites now support hybrid post-quantum\u00a0key exchange. But that progress hasn\u2019t translated into enterprise readiness. Most organizations still lack visibility into where cryptography is used across their environments.<\/p>\n<p>\u201cWhat\u2019s often overlooked is that the same steps required for\u00a0quantum\u00a0readiness (i.e.: cryptographic inventory, automation and crypto agility) are also critical as certificate lifespans move toward 47 days. So the challenge isn\u2019t awareness anymore; it\u2019s execution before these pressures collide.\u201d<\/p>\n<p>Drew Todd <a class=\"Link\" href=\"https:\/\/www.secureworld.io\/industry-news\/google-2029-deadline-post-quantum-cryptography-migration\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">wrote this piece on the same PQC timeline topic for SecureWorld<\/a>:<\/p>\n<p>\u201cThe announcement is not without precedent. Google has been investing in post-quantum security across its product stack for several years. Chrome has supported PQC key-exchange mechanisms, Google Cloud has offered PQC capabilities to enterprise customers, and internal communications infrastructure has already transitioned to quantum-safe protocols.<\/p>\n<p>\u201cThe latest concrete milestone: Android 17 will integrate PQC digital signature protection using ML-DSA, aligned with the U.S. National Institute of Standards and Technology\u2019s (NIST) published post-quantum standards. This brings PQC protections directly to end-user devices at scale \u2014 a significant deployment milestone given Android\u2019s global footprint. \u2026<\/p>\n<p>\u201cFor enterprise security practitioners, the 2029 horizon is close enough to warrant immediate planning. PQC migrations are not lift-and-shift operations; they require cryptographic inventory, dependency mapping, algorithm selection aligned with NIST standards, and integration testing across complex, often legacy infrastructure. At the same time, organizations preparing for 47-day certificate lifecycles are already building the automation and certificate management pipelines that PQC transitions will also require. \u2026\u201d<\/p>\n<p>        DIGGING DEEPER ON PQC<br \/>I\u2019ve been covering the <a class=\"Link\" href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/quantum-computers-what-is-q-day-and-whats-the-solution\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">coming reality of Q-Day on this blog<\/a> for several years now. Michael McLaughlin said this in an interview back in 2023, which seems even more important today:<\/p>\n<p>\u201cFirst, on Q-Day, networks secured using traditional encryption methods will be vulnerable to compromise by a nation-state. Given the recent breaches attributed to Chinese cyber actors, such as Marriott-Starwood, Equifax and the Office of Personnel Management, it is clear that there exists a capable nation-state that is currently developing a quantum computer and motivated to steal massive amounts of data from private companies.<\/p>\n<p>\u201cSecond \u2014 and this is critically important \u2014 any data that has been compromised at any point leading up to Q-Day, whether encrypted or not, will become readable. Unless companies are securing their networks and data using quantum-resistant cryptography, they will be opening themselves and their customers up to compromise. This is everything from the blueprints for next-generation fighter jets to protected health information to financial information \u2014 each of which can carry significant penalties in the event of a breach.<\/p>\n<p>\u201cTo mitigate both of these eventualities, companies should be migrating their network architecture to quantum-resistant cryptography and methods. Fortunately, there are several commercial solutions that exist on the market today available for adoption.\u201d<\/p>\n<p>FINAL THOUGHTS<br \/>As I described last week in my <a class=\"Link\" href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/rsac-2026-highlights-from-agentic-ai-to-active-defense\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">RSA Conference summary<\/a>, the term \u201cAI\u201d has become the ubiquitous \u201cpixie dust\u201d that every company now markets in their new products and services. It was difficult, but not impossible, at RSAC to hear about products focusing on PQC and road maps to get that resolved.<\/p>\n<p>But Google\u2019s recent announcements, along with <a class=\"Link\" href=\"https:\/\/www.brandeis.edu\/stories\/2026\/march\/quantum-dots.html\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">other supporting quantum stories<\/a>, are like to cause <a class=\"Link\" href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/the-top-26-security-predictions-for-2026-part-1\" target=\"_blank\" data-cms-ai=\"0\" rel=\"nofollow noopener\">the top 2026 security industry predictions on PQC to become a reality<\/a>. As a reminder, I wrote this as a top industry trend for this year:<\/p>\n<p>\u201cThe Shift to Post-Quantum Security: Organizations must accelerate the transition to post-quantum cryptography to defend against \u2018harvest now, decrypt later\u2019 strategies from sophisticated adversaries.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"On March 25, Google released a blog post titled \u201cQuantum frontiers may be closer than they appear.\u201d Here\u2019s&hellip;\n","protected":false},"author":2,"featured_media":377778,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[85,46,370,141],"class_list":{"0":"post-377777","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-physics","8":"tag-il","9":"tag-israel","10":"tag-physics","11":"tag-science"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts\/377777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/comments?post=377777"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts\/377777\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/media\/377778"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/media?parent=377777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/categories?post=377777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/tags?post=377777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}